CN109587099A - One kind carrying out guard method and device to privacy of user in Video chat - Google Patents
One kind carrying out guard method and device to privacy of user in Video chat Download PDFInfo
- Publication number
- CN109587099A CN109587099A CN201710908764.4A CN201710908764A CN109587099A CN 109587099 A CN109587099 A CN 109587099A CN 201710908764 A CN201710908764 A CN 201710908764A CN 109587099 A CN109587099 A CN 109587099A
- Authority
- CN
- China
- Prior art keywords
- client
- user
- key
- encryption
- private key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/046—Interoperability with other network applications or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/07—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
- H04L51/10—Multimedia information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses one kind to carry out guard method to privacy of user in Video chat, the interaction request for being used to carry out Video chat interaction with the second client sent by receiving the first client;It is then based on the interaction request, encryption is carried out to interactive information using second client corresponding private key and forms encrypted cipher text;Since the private key encryption can only use corresponding public key decryptions, and public key only has the second client just and has, other clients are no, so the encrypted cipher text is finally sent to second client, so that second client is decrypted using public key corresponding with the private key.Since the public key of the second client only has the second client to have, other clients are the public keys without the second client, therefore, even the encrypted cipher text is intercepted by a third party, also it has no idea to decrypt, and then can guarantee the first client and the second client safety that interactive information is transmitted in video interactive.
Description
Technical field
This application involves live video Stream Technology field, more particularly to one kind in Video chat to privacy of user into
Row guard method and device.
Background technique
Liked currently, video designs class product has obtained more user, one is especially occupied in young user
Fixed market.Video friend-making simultaneously can also design some functions and stranger is allowed to carry out random fit or specific matching
Carry out Video chat.
However, Video chat is different from text chat, the people of other side can see, so comparing the social activity of text chat
Class product then needs more to focus on the secrecy and safety of user data in safety or privacy of user angle.
Summary of the invention
Invention provides one kind to carry out guard method and device to privacy of user in Video chat, current to solve
Video chat the lower technical problem of safety.
Protection side is carried out to privacy of user in Video chat in order to solve the above technical problems, the present invention provides one kind
Method, which comprises
Receive the interaction request of the first client transmission being used for and the second client progress Video chat is interactive;
Based on the interaction request, encryption formation is carried out to interactive information using second client corresponding private key and is added
Ciphertext;Wherein, the corresponding private key of second client is the non-encrypted algorithm of server by utilizing for second client
Private key generate, that second client is exclusive;
The encrypted cipher text is sent to second client, so that second client utilizes and the private key pair
The public key answered is decrypted;Wherein, the public key is asymmetric arithmetic described in the server by utilizing for second client
That end generates, second client is exclusive and corresponding with private key public key.
Preferably, described that encryption formation encryption is carried out to the interactive information using second client corresponding private key
Before ciphertext, the method also includes:
The encryption key that second client is sent is received, and the interactive information is carried out using the encryption key
Encryption;Wherein, the encryption key is to belong to the exclusive key of second client.
Preferably, described that encryption formation encryption is carried out to the interactive information using second client corresponding private key
Before ciphertext, the method also includes:
The first coding rule that second client is sent is received, and generates encryption private using first coding rule
Key, and the interactive information is encrypted using the encryption key that first coding rule generates.
Preferably, described that encryption formation encryption is carried out to the interactive information using second client corresponding private key
Before ciphertext, the method also includes:
Encryption key is generated based on the second coding rule, and the encryption key generated using second coding rule is to institute
Interactive information is stated to be encrypted;
Second coding rule is sent to second client.
Preferably, it is described using the corresponding private key of second client to interactive information carry out encryption form encrypted cipher text
Before, the method also includes:
Determine that first client generates the current time stamp of the interactive information;
The current time stamp is added in interactive information.
Preferably, it is described using the corresponding private key of second client to interactive information carry out encryption form encrypted cipher text
Before, the method also includes:
Generate first client for and second client carry out Video chat interact temporary identifier, it is described
The unique user identity of temporary identifier and first client proves that mark UID is different;
Mark is proved using the user identity that the temporary identifier replaces first client, and the interaction letter is added
In breath.
Preferably, the interactive information includes at least: the title of user, the temporary identifier, the gender of user, user
Hobby, the city of user, first client generate the current time stamp of the interactive information.
Another aspect of the present invention discloses one kind and carries out protective device to privacy of user in Video chat, comprising:
Receiving module, for receiving the friendship of the first client transmission being used for and the second client progress Video chat is interactive
Mutually request;
Encrypting module, for being based on the interaction request, using the corresponding private key of second client to interactive information
It carries out encryption and forms encrypted cipher text;Wherein, the corresponding private key of second client is that the non-encrypted algorithm of server by utilizing is directed to
Private key that second client generates, that second client is exclusive;
Sending module, for the encrypted cipher text to be sent to second client, so that second client is sharp
It is decrypted with public key corresponding with the private key;Wherein, the public key is asymmetric arithmetic needle described in the server by utilizing
Generating to second client, second client is exclusive and corresponding with private key public key.
Preferably, the encrypting module is also used to using the corresponding private key of second client to the interactive information
It carries out encryption to be formed before encrypted cipher text, receives the encryption key that second client is sent, and utilize the encryption key
The interactive information is encrypted;Wherein, the encryption key is to belong to the exclusive key of second client.
Preferably, the encrypting module is also used to receive the first coding rule that second client is sent, and utilizes
First coding rule generates encryption key, and the encryption key generated using first coding rule believes the interaction
Breath is encrypted.
Preferably, the encrypting module is also used to be generated encryption key based on the second coding rule, and utilizes described second
The encryption key that coding rule generates encrypts the interactive information;
The sending module is also used to second coding rule being sent to second client.
Preferably, described device further include:
Determining module, for determining that first client generates the current time stamp of the interactive information;
First is added module, for the current time stamp to be added in interactive information.
Preferably, described device further include:
Generation module, for generate first client for and second client carry out Video chat interact
Temporary identifier, the unique user identity of the temporary identifier and first client prove that mark UID is different;
Second is added module, and the user identity for replacing first client using the temporary identifier proves mark
Know, and is added in the interactive information.
Preferably, the interactive information includes at least: the title of user, the temporary identifier, the gender of user, user
Hobby, the city of user, first client generate the current time stamp of the interactive information.
Another aspect of the present invention discloses a kind of computer readable storage medium, is stored thereon with computer program,
The step in above method technical solution is realized when its program is executed by processor.
Another aspect of the present invention, discloses a kind of computer equipment, including memory, processor and is stored in storage
On device and the computer program that can run on a processor, the processor realize the above method technical side when executing described program
Step in case.
One or more technical solution through the invention, the invention has the advantages that advantage:
The invention discloses one kind to carry out guard method to privacy of user in Video chat, by receiving the first client
The interaction request being used for and the second client progress Video chat is interactive sent;It is then based on the interaction request, utilizes institute
State the corresponding private key of the second client to interactive information carry out encryption form encrypted cipher text;Since the private key encryption can only use correspondence
Public key decryptions, and public key only has the second client just and has, other clients are no, so finally by the encrypted cipher text
It is sent to second client, so that second client is decrypted using public key corresponding with the private key.Due to
The public key of second client only has the second client to have, and other clients are the public keys without the second client, therefore, i.e.,
It is that the encrypted cipher text is intercepted by a third party, also has no idea to decrypt, and then can guarantee the first client and the second client
The safety that interactive information is transmitted in video interactive.
Detailed description of the invention
Fig. 1 is the interaction schematic diagram of client and server in the embodiment of the present invention;
Fig. 2 is a kind of flow chart for carrying out guard method to privacy of user in Video chat in the embodiment of the present invention;
Fig. 3 is a kind of schematic diagram for carrying out protective device to privacy of user in Video chat in the embodiment of the present invention.
Specific embodiment
In order to make the application the technical staff in the technical field be more clearly understood that the application, with reference to the accompanying drawing,
Technical scheme is described in detail by specific embodiment.
Server of the invention refers to the background server of net cast platform, such as the background server of XX live streaming.
Net cast platform is a kind of form of expression of server of the invention.
Client of the invention refers to client corresponding with user, is not to refer in particular to some equipment itself.Even
The same equipment, two users are logged on net cast platform respectively using different accounts, then being just referred to as respectively
Are as follows: the corresponding client of user 1 and the corresponding client of user 2 are seen as two different clients.And the same use
Family is logged on net cast platform respectively using two accounts, is also seen as two clients.That is, to this hair
For bright single user, user, account, the relationship of client are: 1 user, N number of account, N client, N are positive integer,
That is, 1 user can register with multiple accounts on direct broadcast service platform, each account corresponds to a client.
So the targeted user of the first client and the second client of the invention, it may be possible to the same person, it is also possible to be different
People.Certainly, for ease of description, the first client and the second client of the invention are corresponding is different user.This
In citing in invention, it is to use that it is user A, corresponding the second client (customer end B) that the first client (customer end A) is corresponding
Family B.
The main object of the present invention be to two videos make friends user when carrying out information exchange, guarantee interactive information
Secrecy and safety.Due to the particularity that video is made friends, so the safety of interactive information is even more important.
Firstly, each user logs on to Video service platform using corresponding client, Video service platform is to answer
Exist with the form of program, is a kind of form that server is presented, such as the application program etc. of live streaming class.
Secondly, it is non-right that server can utilize each client for logging on to net cast platform for server
Encryption Algorithm is claimed to generate a pair of of public, private key, different clients then generates different public, private keys.Not with symmetric encipherment algorithm
Together, rivest, shamir, adelman needs two keys: public-key cryptography (publickey) and private cipher key (privatekey).It is open
Key and private cipher key are a pair, if encrypted with public-key cryptography to data, could only be solved with corresponding private cipher key
It is close;If encrypted with private cipher key pair data, could only be decrypted with corresponding public-key cryptography.Because of encryption reconciliation
It is close to use two different keys, so this algorithm is called rivest, shamir, adelman.In the specific implementation process, when
After user logs on to server using client, server can verify the account, only legal registration user's ability
Normally log on to Platform Server.After login authentication success, server can then generate a pair of of public, private key, and server leads to public key
It crosses network protocol and is sent to the client, private key server is saved itself.For each Account Logon to server, clothes
Business device all takes identical strategy.It is implemented as follows:
Public, private key is generated using asymmetric arithmetic RSA herein.
RSA.CreatePairKey(SecretKey,PublicKey);
Use RSA Algorithm next life private key KEY and public key KEY in a pair.
This public, private key is then a pair of of code key, wherein can be with public key come encryption data, with private key come ciphertext data.Service
Public key PublicKey can be then sent to the user by device.
When each client logs in, server can then generate respective a pair of of public, private key for each client, then
The public key of generation is sent to corresponding client.It for example, is the interaction schematic diagram of client and server referring to Fig. 1.
After first client (customer end A) and the second client (customer end B) log in platform, server meeting needle is utilized to customer end A
Corresponding a pair of of public key a private key a ' is generated, corresponding public key a is sent to customer end A.Server is for customer end B generation pair
Another pair public key b private key b ' answered, is sent to customer end B for corresponding public key b.These two pair public, private key is different.
When user searches video friend-making user by search, the interactive information that server can then make friends a pair of of video,
Other side is sent to after encrypting using the private key of other side.For example, the interactive information that customer end A is sent to customer end B makes
It is encrypted with the private key b ' of customer end B.Then, encrypted interactive information is sent to customer end B.It is carried out in customer end B
When decryption, there is the public key b that can unlock the encrypted interactive information due to there was only customer end B, so this user information exists
It when transmitting in network, even if being intercepted by hacker, also has no idea to decrypt, thereby may be ensured that in a pair of of video friend-making information
User information is the state of complete encipherment protection, and then guarantees the safety of information transmission.
Lower mask body introduces implementation process of the invention.
Referring to Fig. 2, the invention discloses one kind to carry out guard method, this method packet to privacy of user in Video chat
It includes:
Step 11, the interaction for carrying out Video chat interaction with the second client that the first client is sent is received to ask
It asks.
In the specific implementation process, it when the interaction request of the embodiment of the present invention can be Video chat and start, is searching
The interaction request generated when good friend;It is also possible to after becoming good friend, what when Video chat generated disappears for sending respectively chat
The interaction request of breath.
For example, when user A (that is: using the user of the first client) by video friend-making to search good friend when, such as it is logical
The pet name or other (such as: user location) are crossed to find matched video good friend user B (that is: using the use of the second client
Family) when, the first client can be generated according to the operation of user A for carrying out Video chat interaction with the second client (user B)
Interaction request, server then needs that the user information of user A is first sent the past according to the interaction request, and receives good friend
The user information of user B, if by mutual consent, so that matched two users can carry out Video chat.
Step 12, it is based on the interaction request, interactive information is added using second client corresponding private key
Close formation encrypted cipher text.
In the specific implementation process of the present embodiment, the interactive information that the embodiment of the present invention is mentioned is introduced first.
Interactive information, be the first client be sent to the second client for interaction information, divided according to type, including
But it is not limited to: the individual privacy sent when voice-enabled chat information, Video chat information, text chat information, request plusing good friend
Information etc..
And the particular content of interactive information, include but is not limited to be: the title of user, user UID (user identity card
Bright, User Identification), the gender of user, the hobby of user, user city, generate interactive information it is current when
Between stamp, chat content etc..
In these interactive information particular contents, for the UID of user, due to video make friends particularity, for
The privacy of user then needs more safeties and anti-harassment.And in video dating site, the UID of a user is then represented
The unique identification of one user, be it is fixed, can really indicate the information of the user.For example, first is after forum registers
UID23 is obtained, UID23 means that first.That second registration thereafter should be UID24, and UID24 means that second.
For so this UID once acquired in other side, other side has been known that the true UID of the user, then is likely at this
After chat terminates, chat is constantly harassed by other side in the case where user is not desired to contact again originally.So the present invention is real
It applies in example and the corresponding UID uniquely fixed of client is modified as temporary identifier (interim UID).That is, daily or every
Secondary chat server can all regenerate an interim UID to client, and the true UID of the interim UID and user is different, cannot
The truth for enough reacting user, is intended only as the mark of substitution, interim UID be it is variable, when each video interactive, service
Device can distribute interim UID (certainly, if the second client sends interactive information to send the first client of interactive information
When, server also can distribute interim UID for the second client).And then when video is made friends and is matched, user's in interactive information
UID is then to be replaced by interim UID, rather than the true UID of user, so that the true UID of user be hidden.And
What interim UID then always changed, then specific a certain individual is not corresponded to, and the safety of user is protected with this.
So using the corresponding private key of second client to interactive information carry out encryption formed encrypted cipher text it
Before, server can be handled the corresponding interactive information of the first client, in specific treatment process, generate described first
Client is used for and second client carries out the temporary identifier of Video chat interaction, the temporary identifier and first visitor
The unique user identity in family end proves that mark UID is different;Then the use of first client is replaced using the temporary identifier
Family proof of identification mark, and be added in the interactive information.In this way, which user's user identity in interactive information proves mark
UID has then been replaced by interim UID.
And for timestamp, the encrypted result of information can be made with more changeability, because of the first client pair
The user information answered will not change, and will not change so as to cause the result of encryption, and introduce time variable, then encrypted result is each
It will be variation, thus more safe.
So using the corresponding private key of second client to interactive information carry out encryption formed encrypted cipher text it
Before, server can determine whether that first client generates the current time stamp of the interactive information;The current time stamp is added
Enter in interactive information.
After introduction finishes interactive information, the present invention believes the interaction in the corresponding private key of the first client of server by utilizing
Before breath is encrypted, the first client can upload the interactive information to server, report interactive information to the mistake of server
Cheng Zhong, the first client are to be encrypted using corresponding public key, and then server is after receiving the interactive information,
It is to be decrypted using the corresponding private key of the first client.For example, when customer end A updates or report of user is personal
When information is to server, such as the location information or other information that report oneself, to server, customer end A then will use client
The corresponding public key of A is come to server is re-send to after information encryption, so only server just has the corresponding private key solution of customer end A
Close information out, to ensure safety of the information in network transmission process.
And during server for encrypting, will use the corresponding private key of the second client encrypts interactive information,
So being merely able to that interactive information is decrypted using the corresponding public key of the second client, even by hacker institute in decryption
Interception, also has no idea to decrypt, thereby may be ensured that the safety of the user information in a pair of of video friend-making information.
The corresponding private key of second client is that the non-encrypted algorithm of server by utilizing is generated for second client
, the private key that second client is exclusive.That is, the corresponding private key of the second client is that the second client is exclusive,
Other clients do not have, so even being that other clients have obtained the encrypted cipher text, can not decrypt, to guarantee interactive letter
Cease the safety of transmission.
As a kind of optional embodiment, in order to further ensure the safety of encryption, can using private key encryption it
Before, first interactive information is encrypted.In the specific implementation process, server receives the encryption that second client is sent
Key, and the interactive information is encrypted using the encryption key.Wherein, the encryption key is to belong to described second
The exclusive key of client.Specifically, encryption key is to be sent to server by the second client.So server exists
When sending interactive information, without retransmiting encryption key to the second client, the second client can call directly local add
It is decrypted close key pair, can be avoided transmission encryption key, and then reduce and be intercepted by a third party the risk usurped, further
Guarantee the safety of information transmission.Also, have since encryption key only has the second client and server, even if so encrypting it
Interactive information afterwards is obtained by other client, is also had no idea to decrypt, be thereby may be ensured that in a pair of of video friend-making information
User information safety.
As a kind of optional embodiment, the second client can not directly transmit encryption key, and only send coding
The coding rule of encryption key is to server.Specifically, in the corresponding private key of utilization second client to interactive information
It carries out encryption to be formed before encrypted cipher text, receives the first coding rule that second client is sent, and utilize described first
Coding rule generates encryption key, and is added using the encryption key that first coding rule generates to the interactive information
It is close.The advantage of doing so is that: firstly, the first coding rule is to be sent to server by the second client.So server exists
When sending interactive information, without retransmiting encryption key to the second client, the second client can call directly local the
One coding rule generates encryption key and it is decrypted, and can be avoided the first coding rule of transmission, and then reduce by third party
The risk usurped is intercepted, is further ensured that the safety of information transmission.Secondly as the first coding rule only have the second client and
Server just has, even if also having no idea to decrypt so the interactive information after encryption is obtained by other client, so as to
To guarantee the safety of the user information in a pair of of video friend-making information.
As a kind of optional embodiment, the interactive information is being carried out using second client corresponding private key
Encryption is formed before encrypted cipher text, and server is also based on the second coding rule and generates encryption key, and utilizes described second
The encryption key that coding rule generates encrypts the interactive information;Second coding rule is sent to described second
Client.Second coding rule is that the coding rule that server is determined is used to encrypt interactive information.So transmitting
Encrypted interactive information is given after the second client, can also transmit the second coding rule to the second client, so that the second visitor
Family end can generate corresponding decruption key according to the second coding rule and encrypted interactive information is decrypted.Therefore, even if
It is that other clients have got encrypted interactive information, not obtaining the second coding rule is also that can not decrypt to it,
And then it can be further ensured that the safety of information transmission.
After encryption is completed, then next step can be carried out.
Step 13, the encrypted cipher text is sent to second client, so that second client utilizes and institute
The corresponding public key of private key is stated to be decrypted.
And during decryption, firstly, the public key that the embodiment of the present invention is mentioned, is non-right described in the server by utilizing
Claiming that algorithm generates for second client, second client is exclusive and corresponding with private key public key.
Secondly, being be directed to the generation of the second client using server one during the second client is decrypted
Public key in private-public key is decrypted, since the private-public key is a pair of, and is that the second client is exclusive, so only
There is the second client that the encrypted cipher text can be decrypted.
Since the first client and the second client are actually the process of information exchange, so the second client can also be with
The first client is sent messages to, is then decrypted by the first client.In the process, the second client is sending message
It when to the first client, is sent after being encrypted by the public key of the second client, the second client of server by utilizing
Message is decrypted in corresponding private key.Thereafter, the corresponding private key of the first client of server by utilizing encrypts the message,
It is then forwarded to the first client, and then it is right to can use itself after receiving the message after the encryption for the first client
It is decrypted in the public key answered.
As an example it is assumed that user A (using customer end A) and user B (using customer end B) are matched, first to be regarded
Frequency is chatted, then both sides require to receive the user information of other side.
Firstly, user information is packaged.In video friend-making, both sides is needed to intercourse user information.Specifically
User information includes, the title of user, the interim UID of user, the gender of user, the hobby of user, user city, it is current when
Between stab etc. information be packaged together.
Secondly, being encrypted together to user information Introduction Time stamp.
In the process of encryption:
Introduction Time stamp of the present invention can then make the encrypted result of information with more changeability, because user information will not
Variation, will not change so as to cause the result of encryption, and introduce time variable, then encrypted result can be variation every time, from
And it is more safe.
It is directed to citing of the invention, user A and user B carry out Video chat.Customer end A is needed the user of user A
Information is sent to customer end B, and customer end B needs the user information by user B to be sent to customer end A.
When the user information of user A is sent to customer end B by customer end A, the private key that server then will use customer end B adds
The user information of close user A, and encrypted user information is sent to customer end B, so that only customer end B just can be carried out solution
It is close.
And customer end B is when being sent to customer end A for the user information of user B, then server then will use customer end A
The user information of private key encryption user B, and the user information of encryption is sent to customer end A, so that only customer end A could be into
Row decryption.
It is implemented as follows:
For the ciphering process of the user information of user A:
EncryptUserInfoA=RSA.Encrypt (UserInfoA+Time, BSecretKey);
It is then the user information UserInfoA of user A herein, in addition timestamp information Time, then using customer end B
SecretKey encrypts information.Customer end B is then sent to after encryption.
Similarly for the ciphering process of the user information of B:
EncryptUserInfoB=RSA.Encrypt (UserInfoB+Time, ASecretKey);
It is then the user information UserInfoB of user B herein, in addition timestamp information Time, then using customer end A
SecretKey encrypts information.Customer end A is then sent to after encryption.
Since public key is different for each client, and private key only has server to have, so personal user information
In a network transmission be safe, and being trapped without corresponding private key KEY decryption then can not also crack it is therein
Cleartext information.
So far, it is achieved that after being encrypted for user information using the private key of reciever and is sent to other side's use mutually
Family.
And during decryption:
When user, which is matched to corresponding user, carries out Video chat, then it will receive the user information that server issues, it is first
First user can then be decrypted information, to obtain the cleartext information of the other user.It is implemented as follows:
For user when logging in, server is then handed down to one public key KEY of client.
Assuming that customer end A receives the user information of user B.
UserInfoB=RSA.Decrypt (EncryptUserInfoB, APublicKeyKey);
So customer end A user information that the user B of encryption is then decrypted with the public key APublicKeyKey of oneself, from
And obtain the user information of the user B of plaintext.
So far, it is achieved that the operation that the user information for the other side that server issues is decrypted user.
Based on unified inventive concept, the invention also discloses one kind to carry out protection dress to privacy of user in Video chat
It sets.
Referring to Fig. 3, the inventive system comprises:
Receiving module 31, for receiving being used for and the progress Video chat interaction of the second client for the first client transmission
Interaction request;
Encrypting module 32 believes interaction using the corresponding private key of second client for being based on the interaction request
Breath carries out encryption and forms encrypted cipher text;Wherein, the corresponding private key of second client is the non-encrypted algorithm needle of server by utilizing
Second client is generated, private key that second client is exclusive;
Sending module 33, for the encrypted cipher text to be sent to second client, so that second client
It is decrypted using public key corresponding with the private key;Wherein, the public key is asymmetric arithmetic described in the server by utilizing
Generating for second client, second client is exclusive and corresponding with private key public key.
Preferably, the encrypting module 32 is also used to believe the interaction using the corresponding private key of second client
Breath carries out encryption and is formed before encrypted cipher text, receives the encryption key that second client is sent, and close using the encryption
Key encrypts the interactive information;Wherein, the encryption key is to belong to the exclusive key of second client.
Preferably, the encrypting module 32 is also used to receive the first coding rule that second client is sent, and benefit
Encryption key is generated with first coding rule, and the encryption key generated using first coding rule is to the interaction
Information is encrypted.
Preferably, the encrypting module 32 is also used to be generated encryption key based on the second coding rule, and utilizes described the
The encryption key that two coding rules generate encrypts the interactive information;
The sending module is also used to second coding rule being sent to second client.
Preferably, described device further include:
Determining module, for determining that first client generates the current time stamp of the interactive information;
First is added module, for the current time stamp to be added in interactive information.
Preferably, described device further include:
Generation module, for generate first client for and second client carry out Video chat interact
Temporary identifier, the unique user identity of the temporary identifier and first client prove that mark UID is different;
Second is added module, and the user identity for replacing first client using the temporary identifier proves mark
Know, and is added in the interactive information.
Preferably, the interactive information includes at least: the title of user, the temporary identifier, the gender of user, user
Hobby, the city of user, first client generate the current time stamp of the interactive information.
Based on inventive concept same in previous embodiment, the present invention also provides a kind of computer readable storage medium,
The step of being stored thereon with computer program, any the method above realized when which is executed by processor.
Based on inventive concept same in previous embodiment, the present invention also provides a kind of computer equipment, including storage
Device, processor and storage on a memory and the computer program that can run on a processor, the processor execution journey
The step of any the method above is realized when sequence.
One or more embodiment through the invention, the invention has the advantages that advantage:
The invention discloses one kind to carry out guard method to privacy of user in Video chat, by receiving the first client
The interaction request being used for and the second client progress Video chat is interactive sent;It is then based on the interaction request, utilizes institute
State the corresponding private key of the second client to interactive information carry out encryption form encrypted cipher text;Since the private key encryption can only use correspondence
Public key decryptions, and public key only has the second client just and has, other clients are no, so finally by the encrypted cipher text
It is sent to second client, so that second client is decrypted using public key corresponding with the private key.Due to
The public key of second client only has the second client to have, and other clients are the public keys without the second client, therefore, i.e.,
It is that the encrypted cipher text is intercepted by a third party, also has no idea to decrypt, and then can guarantee the first client and the second client
The safety that interactive information is transmitted in video interactive.
Although the preferred embodiment of the application has been described, but one of ordinary skilled in the art once knows substantially
Creative concept, then additional changes and modifications may be made to these embodiments.It is wrapped so the following claims are intended to be interpreted as
It includes preferred embodiment and falls into all change and modification of the application range.
Obviously, those skilled in the art can carry out various modification and variations without departing from the essence of the application to the application
Mind and range.In this way, if these modifications and variations of the application belong to the range of the claim of this application and its equivalent technologies
Within, then the application is also intended to include these modifications and variations.
Claims (10)
1. one kind carries out guard method to privacy of user in Video chat, which is characterized in that the described method includes:
Receive the interaction request of the first client transmission being used for and the second client progress Video chat is interactive;
Based on the interaction request, it is close that encryption formation encryption is carried out to interactive information using second client corresponding private key
Text;Wherein, the corresponding private key of second client is that the non-encrypted algorithm of server by utilizing is generated for second client
, the private key that second client is exclusive;
The encrypted cipher text is sent to second client, so that second client is using corresponding with the private key
Public key is decrypted;Wherein, the public key is that asymmetric arithmetic described in the server by utilizing is raw for second client
At, second client is exclusive and corresponding with private key public key.
2. the method as described in claim 1, which is characterized in that described to utilize the corresponding private key of second client to described
Interactive information carries out encryption and is formed before encrypted cipher text, the method also includes:
The encryption key that second client is sent is received, and the interactive information is added using the encryption key
It is close;Wherein, the encryption key is to belong to the exclusive key of second client.
3. the method as described in claim 1, which is characterized in that described to utilize the corresponding private key of second client to described
Interactive information carries out encryption and is formed before encrypted cipher text, the method also includes:
The first coding rule that second client is sent is received, and generates encryption key using first coding rule,
And the interactive information is encrypted using the encryption key that first coding rule generates.
4. the method as described in claim 1, which is characterized in that described to utilize the corresponding private key of second client to described
Interactive information carries out encryption and is formed before encrypted cipher text, the method also includes:
Encryption key is generated based on the second coding rule, and the encryption key generated using second coding rule is to the friendship
Mutual information is encrypted;
Second coding rule is sent to second client.
5. the method as described in claim 1, which is characterized in that described to utilize the corresponding private key of second client to interaction
Information carries out encryption and is formed before encrypted cipher text, the method also includes:
Determine that first client generates the current time stamp of the interactive information;
The current time stamp is added in interactive information.
6. method as claimed in claim 6, which is characterized in that described to utilize the corresponding private key of second client to interaction
Information carries out encryption and is formed before encrypted cipher text, the method also includes:
Generate first client for and second client carry out Video chat interaction temporary identifier, it is described temporarily
Mark proves that mark UID is different with the unique user identity of first client;
Mark is proved using the user identity that the temporary identifier replaces first client, and the interactive information is added
In.
7. method as claimed in claim 6, which is characterized in that the interactive information includes at least: the title of user described is faced
When mark, the gender of user, the hobby of user, the city of user, first client generate the current of the interactive information
Timestamp.
8. one kind carries out protective device to privacy of user in Video chat characterized by comprising
Receiving module, the interaction for carrying out Video chat interaction with the second client for receiving the transmission of the first client are asked
It asks;
Encrypting module carries out interactive information using the corresponding private key of second client for being based on the interaction request
Encryption forms encrypted cipher text;Wherein, the corresponding private key of second client is the non-encrypted algorithm of server by utilizing for described
Private key that second client generates, that second client is exclusive;
Sending module, for the encrypted cipher text to be sent to second client so that second client utilize and
The corresponding public key of the private key is decrypted;Wherein, the public key is asymmetric arithmetic described in the server by utilizing for institute
State the generation of the second client, second client is exclusive and corresponding with private key public key.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor
The step of any one of claim 1-7 the method is realized when row.
10. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor
Calculation machine program, which is characterized in that the processor realizes the step of any one of claim 1-7 the method when executing described program
Suddenly.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710908764.4A CN109587099A (en) | 2017-09-29 | 2017-09-29 | One kind carrying out guard method and device to privacy of user in Video chat |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710908764.4A CN109587099A (en) | 2017-09-29 | 2017-09-29 | One kind carrying out guard method and device to privacy of user in Video chat |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109587099A true CN109587099A (en) | 2019-04-05 |
Family
ID=65914352
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710908764.4A Pending CN109587099A (en) | 2017-09-29 | 2017-09-29 | One kind carrying out guard method and device to privacy of user in Video chat |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109587099A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113285870A (en) * | 2021-06-09 | 2021-08-20 | 成都安恒信息技术有限公司 | Method and system for protecting internet chat privacy |
CN116112458A (en) * | 2023-02-09 | 2023-05-12 | 网易(杭州)网络有限公司 | Communication method, device, equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1859081A (en) * | 2006-02-17 | 2006-11-08 | 华为技术有限公司 | Immediate news enciphering transmission method and system |
US20080118070A1 (en) * | 2006-11-20 | 2008-05-22 | 6580874 Canada Inc. | Open and distributed systems to provide secure email service |
CN104954378A (en) * | 2015-06-19 | 2015-09-30 | 收付宝科技有限公司 | Asymmetric message encryption method and system |
CN104980428A (en) * | 2015-04-28 | 2015-10-14 | 腾讯科技(深圳)有限公司 | Network communication method, device and system |
CN105763571A (en) * | 2016-04-27 | 2016-07-13 | 蓝盾信息安全技术有限公司 | SIP-based asymmetric voice encryption |
-
2017
- 2017-09-29 CN CN201710908764.4A patent/CN109587099A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1859081A (en) * | 2006-02-17 | 2006-11-08 | 华为技术有限公司 | Immediate news enciphering transmission method and system |
US20080118070A1 (en) * | 2006-11-20 | 2008-05-22 | 6580874 Canada Inc. | Open and distributed systems to provide secure email service |
CN104980428A (en) * | 2015-04-28 | 2015-10-14 | 腾讯科技(深圳)有限公司 | Network communication method, device and system |
CN104954378A (en) * | 2015-06-19 | 2015-09-30 | 收付宝科技有限公司 | Asymmetric message encryption method and system |
CN105763571A (en) * | 2016-04-27 | 2016-07-13 | 蓝盾信息安全技术有限公司 | SIP-based asymmetric voice encryption |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113285870A (en) * | 2021-06-09 | 2021-08-20 | 成都安恒信息技术有限公司 | Method and system for protecting internet chat privacy |
CN116112458A (en) * | 2023-02-09 | 2023-05-12 | 网易(杭州)网络有限公司 | Communication method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card | |
CN106357396B (en) | Digital signature method and system and quantum key card | |
CN107483505A (en) | The method and system that a kind of privacy of user in Video chat is protected | |
CN105871869B (en) | Hash function and false identity anonymous bidirectional authentication method are based in mobile social networking | |
CN104754581B (en) | A kind of safety certifying method of the LTE wireless networks based on public-key cryptosystem | |
CN102547688B (en) | Virtual-dedicated-channel-based establishment method for high-credibility mobile security communication channel | |
Chaudhry et al. | A multiserver biometric authentication scheme for tmis using elliptic curve cryptography | |
CN111404664B (en) | Quantum secret communication identity authentication system and method based on secret sharing and multiple mobile devices | |
JP2015537483A (en) | Drawing management system and drawing management method by fingerprint authentication | |
CN109951513A (en) | Anti- quantum calculation wired home quantum cloud storage method and system based on quantum key card | |
CN108809636A (en) | The communication system and communication means of message authentication between member are realized based on group's type quantum key card | |
CN111416712B (en) | Quantum secret communication identity authentication system and method based on multiple mobile devices | |
CN105553979A (en) | Encryption publishing method for privacy information in smart power grid | |
Wang et al. | One-round privacy-preserving meeting location determination for smartphone applications | |
CN103368918A (en) | Method, device and system for dynamic password authentication | |
CN109889329A (en) | Anti- quantum calculation wired home quantum communications method and system based on quantum key card | |
CN109587099A (en) | One kind carrying out guard method and device to privacy of user in Video chat | |
Abbas et al. | PRISM: PRivacy-aware interest sharing and matching in mobile social networks | |
Sandoval et al. | Pakemail: authentication and key management in decentralized secure email and messaging via pake | |
CN111526131B (en) | Anti-quantum-computation electronic official document transmission method and system based on secret sharing and quantum communication service station | |
CN113014376B (en) | Method for safety authentication between user and server | |
Go et al. | Wireless authentication protocol preserving user anonymity | |
Chiou et al. | Mobile common friends discovery with friendship ownership and replay-attack resistance | |
Madhusudhan et al. | An efficient and secure user authentication scheme with anonymity in global mobility networks | |
Wang et al. | Secure content sharing protocol for D2D users based on profile matching in social networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190405 |
|
RJ01 | Rejection of invention patent application after publication |